CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Apr 20, 2026

WhatsApp Leaks User Metadata to Attackers

Dark Reading Archived Apr 20, 2026 ✓ Full text saved

Strangers can infer limited info about you without knowing or messaging you, which could theoretically aid certain kinds of malicious activity.

Full text archived locally
✦ AI Summary · Claude Sonnet


    ENDPOINT SECURITY MOBILE SECURITY VULNERABILITIES & THREATS CYBER RISK NEWS WhatsApp Leaks User Metadata to Attackers Strangers can infer limited info about you without knowing or messaging you, which could theoretically aid certain kinds of malicious activity. Nate Nelson,Contributing Writer April 20, 2026 7 Min Read SOURCE: STLEGAT VIA ALAMY STOCK PHOTO Tal Be'ery knew that I was online the night before I called him. He knew what kind of device I was using. I didn't share this information with him. All he had was my phone number. I had no way to know that he was learning that information about me, either. Be’ery, cofounder and chief technology officer (CTO) of Zengo — whose $70 million acquisition by eToro was announced during our call — silently pried into my online habits (with my permission) using a jerry-rigged program he designed to plug into WhatsApp, and exploit the thin layer of metadata it leaks. In a presentation at Black Hat Asia 2026, he'll show that anyone can perform the same tricks, be they sophisticated nation-state advanced persistent threats (APTs) or lowly scammers. It doesn't require any kind of sophisticated zero-day; all one has to do is leverage WhatsApp's own design choices. Dark Reading contacted WhatsApp in the process of reporting this story. The company made no official statement but did confirm the details of Be'ery's findings and alluded to mitigations it's been working on to address the areas of his research WhatsApp deems significant. Related:Two-Factor Authentication Breaks Free from the Desktop Silent Pings In 2024, Austrian researchers described a series of ways that WhatsApp users can send recipients application-layer messages that don't actually show up on the victim's device. With a custom program plugged into the WhatsApp Web protocol, one could, for instance, send a reaction to a message that doesn't exist. Nothing will happen in the recipient's app, but the sender will still be able to infer if they were active and online, based on the time it takes to get a delivery receipt in return. Presumably, if an attacker used such a program to constantly, silently ping a recipient's device, they could paint a picture of their victim's online habits when their victim is online — their sleep or work schedule, when they might be primed to receive the right kind of phishing message, etc. — or perform a resource exhaustion attack, draining the recipient's battery slowly without their knowing why. It's even easier to find out what kinds of devices a victim is using, thanks to a quirk in WhatsApp's flagship security feature. The app provides end-to-end encryption for all chats, to the extent that even WhatsApp itself cannot pry into your texts. To make that happen, each device registered to one's WhatsApp account has its own "fingerprint": private key material and an ID, which differ depending on the underlying operating system (OS). When a sender triggers a new chat with a recipient, behind the scenes, they receive the key material and IDs for the devices that recipient has registered with WhatsApp. Ipso facto, by merely adding a victim to one's contact list — an action that does not alert the victim in any way — an attacker can learn what kinds of devices they use WhatsApp on. Related:Microsoft's Original Windows Secure Boot Certificate Is Expiring "With end-to-end encryption, if someone attacks WhatsApp's servers, they cannot read your data, and even WhatsApp cannot read your data. But the flip side of this coin is that WhatsApp also cannot protect you," Be'ery explains. Device information might not sound interesting, and WhatsApp isn't the only messaging system that leaks it. Apple's iMessage does so much more visibly, in fact, via its famous blue and green text bubbles. Be'ery's security report on this subject did not meet WhatsApp's threshold for generating a CVE, but the researcher argues that device fingerprinting is useful to bad actors. At the benign end of the spectrum, companies could use that kind of information to perform surveillance pricing. "You're a potential customer, and I need to know what price to suggest to you. So I have a tell. Maybe you're willing to pay more because you're an iPhone user, and you also have an iPad, and not cheaper Android-based devices." Related:Orange Business Reimagines Enterprise Voice Communications With Trust and AI In the shady world of spyware, powerful threat actors need to ultra-tailor their attacks to specific operating systems. Armed with this knowledge, nation-states can purchase and deploy tools tailored to their specific targets' devices. In his experiments on me, Be'ery went one step further: He sent a message to my desktop, which never arrived on the other devices on which I have WhatsApp installed. "A properly implemented client would have sent it to all three of the devices. But with a rogue client, then I can send to just one, and if I had a Web exploit, then I would send it to just that device," he explains. WhatsApp's Core Problem If an unrecognized number has ever sent you a WhatsApp message simply saying "Hi" without elaborating, or added you to a huge group chat about cryptocurrencies, you'll know that there's nothing standing in between you and the bad actors of the world on Meta's chat app. Any WhatsApp user can message any of its other 3.5 billion users, so long as the sender knows — or guesses — the right phone number. "From a product perspective, of course it makes a lot of sense," Be'ery acknowledges. "Initially, when you're a small company, before you build your network effect, you don't want to have any friction. You want people to talk to each other." Even compared to other social apps, though, it's highly permissive. "On social networks like LinkedIn or Facebook, I can only get messages from people within my contacts list. And there is a way like a minimal interface for requesting to connect, which cannot contain all kinds of weird data. So it's much more limited, and this creates a much lesser attack surface," Be'ery explains. WhatsApp's open policy about who can contact whom is what enables Be'ery to track this reporter's online habits, pig butchers to frictionlessly reach your parents, and governments to attack dissidents and journalists with 0-click spyware. Although in the latter case, targets who know they're targets can enable WhatsApp's new "Strict Account Settings" feature, at some cost to their user experience. Does WhatsApp Need To Be Fixed? Thus far, Meta hasn't been interested in changing such a fundamental feature of its application logic, for such reasons as Be'ery suggests. Instead it's been working around the problem with features like "Silence Unknown Callers," rate limiting, and more microscopic fixes. Right around the beginning of the year, for instance, Be'ery noticed that the means by which he could fingerprint Android devices running WhatsApp no longer worked. Because iPhones still leak sufficient metadata, and there isn't a third major mobile OS, the outcome is moot for now. In general, partly in response to Be'ery's research, the developers have quietly been eliminating some means of sending silent pings. Be'ery takes issue with this approach. "They're going message type by message type. It's a bit of a whack-a-mole. There are dozens of kinds of 'messages': live location, audio-related, all kinds of media-related, polls, etc. Every new feature is a new kind of method [for silent pinging]. So it's much harder," he says, than simply shielding users from strangers like social media platforms do. "WhatsApp is great," he acknowledges. "I think its end-to-end encryption is much better than what you get, let's say, over Gmail, in which Google is reading your emails because there is no encryption. Having said that, with great power comes great responsibility. I think if only your peers or pre-approved other clients can reach you, then it changes everything. The whole environment would be much safer." Don't miss the latest Dark Reading Confidential podcast, Security Bosses Are All in on AI: Here's Why, where Reddit CISO Fredrick Lee and Omdia analyst Dave Gruber discuss AI and machine learning in the SOC, how successful deployments have (or haven't) been, and what the future holds for AI security products. Listen now! Read more about: Black Hat News About the Author Nate Nelson Contributing Writer Nate Nelson is a journalist and scriptwriter. He writes for "Darknet Diaries" — the most popular podcast in cybersecurity — and co-created the former Top 20 tech podcast "Malicious Life." Before joining Dark Reading, he was a reporter at Threatpost. Want more Dark Reading stories in your Google search results? ADD US NOW More Insights Industry Reports CISO Survey 2026: The State of Incident Response Readiness AI SOC for MDR: The Structural Evolution of Managed Detection and Response How Enterprises Are Developing Secure Applications KuppingerCole Business Application Risk Management Leadership Compass 2026 CISO AI Risk Report Access More Research Webinars Defending Against AI-Powered Attacks: The Evolution of Adversarial Machine Learning Zero Trust Architecture for Cloud environments: Implementation Roadmap Tips for Managing Cloud Security in a Hybrid Environment? Security in the AI Age Identity Maturity Under Pressure: 2026 Findings and How to Catch Up More Webinars You May Also Like ENDPOINT SECURITY Pro-Russian Hackers Use Linux VMs to Hide in Windows by Alexander Culafi NOV 04, 2025 ENDPOINT SECURITY Chrome Store Features Extension Poisoned With Sophisticated Spyware by Elizabeth Montalbano, Contributing Writer JUL 07, 2025 ENDPOINT SECURITY We've All Been Wrong: Phishing Training Doesn't Work by Nate Nelson, Contributing Writer JUL 01, 2025 ENDPOINT SECURITY Attackers Lace Fake GenAI Tools With Malware by Alexander Culafi, Senior News Writer, Dark Reading MAY 12, 2025 Editor's Choice VULNERABILITIES & THREATS EDR-Killer Ecosystem Expansion Requires Stronger BYOVD Defenses byRob Wright APR 14, 2026 8 MIN READ СLOUD SECURITY CSA: CISOs Should Prepare for Post-Mythos Exploit Storm byAlexander Culafi APR 13, 2026 6 MIN READ СLOUD SECURITY Navigating the Unique Security Risks of Asia's Digital Supply Chain byAlexander Culafi APR 15, 2026 3 MIN READ Want more Dark Reading stories in your Google search results? 2026 Security Trends & Outlooks THREAT INTELLIGENCE Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats JAN 2, 2026 CYBER RISK Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult JAN 12, 2026 ENDPOINT SECURITY CISOs Face a Tighter Insurance Market in 2026 JAN 5, 2026 THREAT INTELLIGENCE 2026: The Year Agentic AI Becomes the Attack-Surface Poster Child JAN 30, 2026 Download the Collection Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. SUBSCRIBE Webinars Defending Against AI-Powered Attacks: The Evolution of Adversarial Machine Learning MON, MAY 11, 2026 AT 1:00PM ET Tips for Managing Cloud Security in a Hybrid Environment? THURS, MAY 7, 2026 AT 1PM EST Zero Trust Architecture for Cloud environments: Implementation Roadmap TUES, MAY 12, 2026 AT 1PM EST Security in the AI Age TUES, APRIL 28, 2026 AT 1PM EST Identity Maturity Under Pressure: 2026 Findings and How to Catch Up WED, MAY 6,2026 AT 1PM EST More Webinars White Papers How Sunrun Transformed Security Operations with AiStrike Autonomous Pentesting at Machine Speed, Without False Positives Best practices for incident response planning Building a Robust SOC in a Post-AI World Industry Report: AI, SOC, and Modernizing Cybersecurity Explore More White Papers BLACK HAT ASIA | MARINA BAY SANDS, SINGAPORE Experience cutting-edge cybersecurity insights in this four-day event featuring expert Briefings on the latest research, Arsenal tool demos, a vibrant Business Hall, networking opportunities, and more. Use code DARKREADING for a Free Business Pass or $200 off a Briefings Pass. GET YOUR PASS GISEC GLOBAL 2026 GISEC GLOBAL is the most influential and the largest cybersecurity gathering in the Middle East & Africa, uniting global CISOs, government leaders, technology buyers, and ethical hackers for three power-packed days of innovation, strategy, and live cyber drills. 📌 BOOK YOUR SPACE
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◇ Industry News & Leadership
    Published
    Apr 20, 2026
    Archived
    Apr 20, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗